Volume 24 (2024)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
Software Agent Systems Serving the E-Commerce System a Comparative Study

Farah Tawfiq Abdul Hussien; Abdul Monem S. Rahma; Hala Bahjat Abdul Wahab

Volume 23, Issue 2 , June 2023, Page 1-12

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.1

Abstract
  Providing security for each online consumer over the internet is a critical issue that may cause a time consuming problem that may cause big load on the website server especially for the large websites at the rush time. This process may generate a variety of issues, including response time delays, client ...  Read More ...

Computer
Analytical Study for Optimization Techniques to Prolong WSNs Life

Hayder I. Mutar; Muna M. Jawad

Volume 23, Issue 2 , June 2023, Page 13-23

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.2

Abstract
  Wireless Sensor Networks (WSNs) have become the most cost- effective monitoring solution due to their low cost, despite their major drawback of limited power due to dependence on batteries. Each Sensor Node (SN) is clustered in a particular location and forms a network by self-organizing. They often ...  Read More ...

Computer
Short Survey of the Interleaver Technique in Communication System

Zeina Abdullah Humadi; Qusay Fadhel Al-Doori

Volume 23, Issue 2 , June 2023, Page 24-36

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.3

Abstract
  Communication and computing systems have made it easier for the world to transfer data and information from the sender to the recipient at the lowest cost and most efficiency. The transmission process may cause data corruption or error for many reasons, including the environment, the large volume of ...  Read More ...

Control
Sensorless Speed Control for PMSM Based on Multi-Level SVPWM Inverter and MRAS

Ruaa S. Hassan; Farazdaq R. Yaseen

Volume 23, Issue 2 , June 2023, Page 37-50

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.4

Abstract
  Permanent Magnet Synchronous Motors (PMSM) are extensively used in the industry owing to their excellent efficiency, low weight/power ratio, and smooth torque with no or minimal ripple. Field Oriented Control (FOC) is a modern and effective approach for closed-loop controlling the speed of PMSM. In this ...  Read More ...

Control
Discontinuous Speed Control of PMDC Motors with Chattering Attenuation

Bashar F. Midhat

Volume 23, Issue 2 , June 2023, Page 51-62

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.5

Abstract
  In most applications, electric drives are actuated using on/off devices due to their low cost and also due to the relatively high power consumption of the electric drives which make applying linear power amplifiers very costly. In this paper, the operation of PMDC motors under discontinuous control action ...  Read More ...

Computer
Dynamic Obstacle Avoidance Algorithm for Autonomous Mobile Robots

Noor Abdul Khaleq Zghair; Ahmed S. Al-Araji

Volume 23, Issue 2 , June 2023, Page 63-82

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.6

Abstract
  A mobile robot's major purpose is to get to its destination by traveling over an optimum path defined by various parameters such as time, distance, and the robot's safety from any impediments in its path. As a result, the backbone of the autonomous mobile robot is path planning and obstacle avoidance. ...  Read More ...

Communication
Enhancement of a Two Thresholds sensing system by Segmentation of Confused Regions

Bushra T. Hashim; Hadi T. Ziboon; Sinan M. Abdulsatar

Volume 23, Issue 2 , June 2023, Page 83-94

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.7

Abstract
  A new technique called cognitive radio seeks to utilize the available spectrum.. Spectrum sensing is the fundamental cognitive radio component. There are many types of sensing spectrums, one of which is The Two Thresholds Based on Covariance Absolute Values (TTCAV) method. This method's confused region, ...  Read More ...

Computer
Design and Implementation of Security Gatway for IoT Devices Security

Ekhlas Kadhum Hamza; Marwan Alaa Hussein

Volume 23, Issue 2 , June 2023, Page 95-111

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.8

Abstract
  As the Internet of Things (IoT) is growing in popularity globally, which has resulted in a rise in cyber threats, experts are focusing more on its security. The majority of IoT security research to date has concentrated on huge devices, while small IoT devices have received comparably little attention. ...  Read More ...

Computer
Automatic Translation From Iraqi Sign Language to Arabic Text or Speech Using CNN

Raja’a M. Mohammed; Suhad M. Kadhem

Volume 23, Issue 2 , June 2023, Page 112-124

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.9

Abstract
  Sign language (SL) is Non-verbal communication and a way for thedeaf and mute to communicate without words. A deaf and mute person's hands,face, and body shows what they want to say. Since the number of deaf and dumbpeople is increasing, there must be other ways to learn sign language orcommunicate with ...  Read More ...

Control
Whale Optimization Algorithm Enhances the Performance of Knee-Exoskeleton System Controlled by SMC

Zahraa Ali Waheed; Amjad Jaleel Humaidi

Volume 23, Issue 2 , June 2023, Page 125-135

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.10

Abstract
  Physiotherapeutic exoskeleton devices have recently been developed to helppeople rehabilitate impaired limb mobility and replace the use of physiotherapists. Suchsystems are characterized by high nonlinear and time-varying coefficients. In order tocope with such difficult control challenges, a need arose ...  Read More ...

Computer
Object Detection Using Deep Learning Methods: A Review

Asmaa Hasan Alrubaie; Maisa'a Abid Ali Khodher; Ahmed Talib Abdulameer

Volume 23, Issue 2 , June 2023, Page 136-152

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.11

Abstract
  Target detection, one of the key functions of computer vision, has grown in importance as a study area over the past two decades and is currently often employed. In a certain video, it seeks to rapidly and precisely detect and locate a huge amount of the objects according to redetermined categories. ...  Read More ...

Computer
A survey on Deep Learning Face Synthesis and Animation Techniques Used in Deepfake

Suha Mohammed Saleh; Abdulamir A. Karim

Volume 23, Issue 2 , June 2023, Page 153-159

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.12

Abstract
  From big data analytics to computer vision and human-level control, deep learning has been effectively applied to a wide range of complicated challenges. However, these same deep learning advancements have also been used to develop malicious software that threatens individuals' personal data, democratic ...  Read More ...

Computer
Design an Algorithm for dynamic Slice of SD-WAN Using VLAN

Talah Oday Alani; Ameer Mosa Al-Sadi

Volume 23, Issue 2 , June 2023, Page 160-175

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.13

Abstract
  Software-Defined Network (SDN) is one of the most predominant technologies for networking in the existing and next-generation networks. SDN can conFig. , control, protect, and optimize network resources through software. The fundamental benefit of SDN is enabling the application of dynamic management. ...  Read More ...

Computer
Recognition of Upper Limb Movements Based on Hybrid EEG and EMG Signals for Human-Robot Interaction

Huda M. Rada; Alia Karim Abdul Hassan; Ali H. Al-Timemy

Volume 23, Issue 2 , June 2023, Page 176-191

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.14

Abstract
  Upper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive ...  Read More ...

Computer
A Systematic Review of Deep Dream

Lafta R. Al-Khazraji; Ayad R. Abbas; Abeer S. Jamil

Volume 23, Issue 2 , June 2023, Page 192-209

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.15

Abstract
  Deep Dream (DD) is a new technology that works as a creative image-editing approach by employing the representations of CNN to produce dreams-like images by taking the benefits of both Deep CNN and Inception to build the dream through layer-by-layer implementation. As the days go by, the DD becomes widely ...  Read More ...

Computer
Abnormal Behavior Detection in Video Surveillance Using Inception-v3 Transfer Learning Approaches

Sabah Abdulazeez Jebur; Khalid A. Hussein; Haider Kadhim Hoomod

Volume 23, Issue 2 , June 2023, Page 210-221

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.16

Abstract
  The use of video surveillance systems has increased due to security concerns and their relatively low cost. Researchers are working to create intelligent Closed Circuit Television (CCTV) cameras that can automatically analyze behavior in real-time to detect anomalous behaviors and prevent dangerous accidents. ...  Read More ...